There is no validation to ensure that the provided token contract is valid. A malicious contract could be passed as the token
parameter, potentially leading to unintended behavior or loss of funds.
If a malicious contract is used, it could manipulate token transfers or have other vulnerabilities that compromise the treasury’s integrity.
Add checks to ensure the token is a valid ERC20 token contract. This can be done by checking that the token
implements the IERC20
interface correctly, or by adding a whitelist of valid token contracts. Consider adding an interface check or whitelisting valid token contracts before performing transfers:
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.